Sensor wars: Detecting and defending against spam attacks in wireless sensor networks

被引:3
作者
Sancak, S [1 ]
Cayirci, E [1 ]
Coskun, V [1 ]
Levi, A [1 ]
机构
[1] Turkish Naval Acad, Naval Sci & Engn Inst, Istanbul, Turkey
来源
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7 | 2004年
关键词
wireless sensor networks; security; quarantine region; spam attacks;
D O I
10.1109/ICC.2004.1313227
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets that make the nodes relaying them deplete their energy. Especially the nodes closer to the sink fail sooner, because they convey more data packets. This causes the sink to be, disconnected from the sensor network. The counter-measures for this type of attacks, namely spam attacks, should consider that the sensor nodes have limited energy, computational power and memory. In this paper, we propose detect and defend against spams (DADS) scheme. In DADS the vicinity of the detected malicious node is notified about the quarantine region, and nodes do not relay unauthenticated messages coming from a node in the quarantine region. Our experiments show that our scheme fits the requirements of the sensor network.
引用
收藏
页码:3668 / 3672
页数:5
相关论文
共 50 条
  • [21] Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes
    Bankovic, Zorana
    Fraga, David
    Moya, Jose M.
    Carlos Vallejo, Juan
    SENSORS, 2012, 12 (08) : 10834 - 10850
  • [22] Security Attacks in Wireless Sensor Networks: A Survey
    Patel, Manish M.
    Aggarwal, Akshai
    2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 329 - 333
  • [23] Attacks and Challenges in Wireless Sensor Networks
    Dinker, Aarti Gautam
    Sharma, Vidushi
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3069 - 3074
  • [24] DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS USING HOP COUNT ANALYSIS
    Yao, Lan
    Zhao, Zhibin
    Yu, Ge
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (01) : 229 - 243
  • [25] Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    Ning, Peng
    Liu, An
    Du, Wenliang
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (01)
  • [26] A defense against clock skew replication attacks in wireless sensor networks
    Huang, Ding-Jie
    Teng, Wei-Chung
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 39 : 26 - 37
  • [27] Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
    Siasi, Nazli
    Aldalbahi, Adel
    Jasim, Mohammed A.
    2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
  • [28] Improving Resilience against Node Capture Attacks in Wireless Sensor Networks using ICmetrics
    Tahir, Ruhma
    McDonald-Maier, Klaus
    2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2012, : 127 - 130
  • [29] Distributed Detection of Wormhole Attacks in Wireless Sensor Networks
    de Graaf, Rennie
    Hegazy, Islam
    Horton, Jeffrey
    Safavi-Naini, Reihaneh
    AD HOC NETWORKS, 2010, 28 : 208 - +
  • [30] Secure Decentralized Data Transfer against Node Capture Attacks for Wireless Sensor Networks
    Kohno, Eitaro
    Ohta, Tomoyuki
    Kakuda, Yoshiaki
    ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 35 - 40